Researchers break into Windows encryption feature

With effort, hackers are able to break into an encryption feature available on newer versions of Windows.

security code

Researchers can break into BitLocker, the disk encryption feature available in Windows 7, Vista and Server 2008.

German experts from the Franhofer Institute for Secure Information Technology (SIT) revealed five attack strategies against BitLocker and the way its Trusted Platform Module (TPM) sealing mechanism works.

In certain circumstances, the researchers claim that dedicated hackers could "circumvent the protection and break confidentiality with limited effort".

"Our attacks neither exploit vulnerabilities in the encryption itself nor do they directly attack the TPM," the researchers claim in a report.

"They rather exploit sequences of actions that Trusted Computing fails to prevent, demonstrating limitations of the technology."

One attack took advantage of the boot process, where BitLocker needs to interact with the user to obtain a password or a key file from a USB memory stick, or both.

The program code interacting with the user is unencrypted, so an attacker with physical access is able to modify it.

The hacker could replace the original BitLocker boot code with a manipulated version, and spoof the user interaction with BitLocker.

The researchers made it clear that that they were using targeted attacks', where an attacker would devote considerable effort in trying to access data on a disk, for example in corporate espionage.

BitLocker is better designed to withstand real-world opportunistic attacks' for example, if a computer was stolen and somebody was trying to access the data to see what they could get.

Paul Cooke from Microsoft confirmed as much in a blog post. He said: "This research is similar to other published attacks where the owner leaves a computer unattended in a hotel room and anyone with access to the room could tamper with this computer.

"This sort of targeted attack poses a relatively low risk to folks who use BitLocker in the real world."

He added: "These sorts of targeted threats are not new and are something we've addressed in the past; in 2006 we discussed similar attacks, where we've been straightforward with customers and partners that BitLocker does not protect against these unlikely, targeted attacks."

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021

Most Popular

University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021